There are several ways to infect systems and spread malicious files. one of the widely used method is the fake application update this because it is something that we do constantly and user trust the application vendor. over this week

Sometime you want to investigate application and processes running on the windows operating system. this will help to find the functions performed by the app which can be legitimate , suspicious or malicious. in similar cases you can check SpyStudio.

Over 69 percent of enterprises plan to make significant cloud investments over the next three years to migrate their business functions to the cloud, according to a study by Oxford Economics and SAP. This research also shows that 44 percent

Symantec have issued the monthly report that include spam level detected in the cyber space. According to the monthly report Spam level decreased below 50 percent for over a decade. level of spam have decreased in June 2015 below 50%

This week OpenSSL Fixed a Critical Vulnerability, the new security vulnerability discovered in OpenSSL. CVE-2015-1793 is due to a problem with authentication certificate processing which may lead to MITM man in the middle attack. OpenSSL Foundation released the patch to

Over this week Trend Micro published an article about Lordfenix a 20-year-old college student created more than 100 Trojans. This is a relatively big number especially when we know that the malwares were designed to steal users financial information. The

Local storage is for the birds. Plenty of modern companies are still using physical servers, but nearly all of them function primarily as a backup system. The most sophisticated corporations don’t even keep these servers onsite, because the benefits of